News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: IT Security Nachrichten
Benutze Feedly zum Abonieren.
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).
Eigene IT Security Webseite / Blog / Quelle hinzufügen
Security Watch: Elon Musk’s NeuraLink Links Brains to iPhones via Bluetooth
Directly linking thoughts to a phone via Bluetooth -- what could go wrong?
It's never good when 'Magecart' and 'bulletproof' appear in the same sentence, but here we are
Ukrainian civil war a bonanza for dodgy malware hosting firms
A growing crop of so-called bulletproof hosting companies are using the ongoing civil war in Ukraine to host Magecart malware without fear of the police coming knocking.…
Fake Office 365 Site Pushes Trickbot Trojan as Browser Update
Attackers have created a fake Office 365 site that is distributing the TrickBot password-stealing Trojan disguised as Chrome and Firefox browser updates. [...]
Apparent Arson Attack Devastates Kyoto Animation Anime Studio With Dozens Confirmed Dead
An anonymous reader quotes a report from The Verge: Several people have been killed after an apparent arson attack gutted a building at Kyoto Animation, one of Japan's most renowned anime studios. NHK reports that 33 people are confirmed dead and many more have been injured. An explosion was heard around the studio at around 10.30AM local time. Police are questioning a man in his 40s who was seen spreading and lighting a gasoline-like liquid in the 1st Studio building, which is said to be where most of Kyoto Animation's mainline production takes place. The Mainichi Shinbun newspaper reports that the man said he started the fire. Kyoto Animation, also known as KyoAni, is best known for series like K-On! and The Melancholy of Haruhi Suzimiya, and release standalone feature A Silent Voice in 2016. Netflix picked up the streaming rights to KyoAni's Violet Evergarden series and made it available worldwide last year.
Read more of this story at Slashdot.
Lawmakers, security pros advise public to use caution with faceapp.
Recommendations for an Introduction to IT Security Training
I'd like to send my 22 year old son on a training around the basics of IT Security (SSL, SSL Certificates, LDAP, AD, Open SSL, Authentication, etc). A friend of mine who is a CISSP suggested SANS, which looks like a good course but the timing is bad. Can anyone else recommend any online or in person courses available in the near term? Apologies if this is not the right forum
Trump Says He's Looking Into a Pentagon Cloud Contract For Amazon or Microsoft
President Donald Trump said on Thursday that he's seriously considering looking at a Pentagon contract that's said to be worth up to $10 billion for Microsoft or Amazon. From a report: "I never had something where more people are complaining," Trump said, adding that he's going to take a close look at it. "We're getting tremendous complaints from other companies," Trump said in a press pool at the White House during a meeting with the prime minister of The Netherlands. "Some of the greatest companies in the world are complaining about it." He named Microsoft, Oracle and IBM. Since April, Microsoft and Amazon have been the only remaining competitors for the contract after IBM and Oracle were ruled out by the Defense Department. The contract, known as JEDI, is viewed as a marquee deal for the company that ultimately wins it, particularly as Microsoft and Amazon are aggressively pursuing government work for their expanding cloud units. While Trump didn't cite Amazon CEO Jeff Bezos by name on Thursday, the billionaire executive has been a constant source of frustration for the president. Bezos owns the Washington Post, which Trump regularly criticizes for its coverage of his administration. Trump also has gone after Amazon repeatedly for, as he claims, not paying its fair share of taxes and ripping of the U.S. Post Office.
Read more of this story at Slashdot.
We Need a Safer Systems Programming Language
In our first post in this series, we discussed the need for proactively addressing memory safety issues. Tools and guidance are demonstrably not preventing this class of vulnerabilities; memory safety issues have represented almost the same proportion of vulnerabilities assigned a CVE for over a decade. We feel that using memory-safe languages will mitigate this …
Kazakhstan government is now intercepting all HTTPS traffic
Kazakh government first wanted to intercept all HTTPS traffic way back in 2016, but they backed off after several lawsuits.
1567114 - MITM on all HTTPS traffic in Kazakhstan
Initial Tests of the Samsung Galaxy S10 5G and 5G Networks in US Cities Find The Phone Often Overheats and Switches To 4G
Joanna Stern, reporting for the Wall Street Journal: One of the biggest findings of my multi-city 5G review tour: The Samsung Galaxy S10 5G isn't reliable in the summer -- unless, well, you summer in Iceland. When I ran tests, the phone's 5G often switched off due to overheating, leaving me with a 4G connection. Cellular carriers demo-ing or testing the phone have taken to cooling the devices with ice packs and air conditioners. The phone does this when the temperature reaches a certain threshold to minimize energy use and optimize battery, a Samsung spokeswoman said. "As 5G technology and the ecosystem evolve, it's only going to get better," she added. But there is good part, too. The report adds: After nearly 120 tests, more than 12 city miles walked and a couple of big blisters, I can report that 5G is fasten-your-seat-belt fast...when you can find it. And you're standing outdoors. And the temperature is just right. As my findings show, 5G is absolutely not ready for you. But like any brand new network technology, it provides a glimpse of the future. "Holy spit!" I said the first time I saw a speed test hit 1,800 megabits per second on Verizon's network in downtown Denver. [...] Don't speak megabits? I downloaded the whole new season of "Stranger Things" from Netflix -- 2.1 gigabytes of video -- in 34 seconds. The same averaged more than an hour on my 4G connections. And I downloaded a huge, 10GB file full of video and images from Google Drive in 2.5 minutes.
Read more of this story at Slashdot.
hackers breached bulgaria's national revenue agency â its own version of the irs â and emailed the personal data of five million citizens to local media.
Neues Windows 10 20H1 Build ist da - mit Lösung für Update-Probleme
Microsoft Begins Testing Windows 10 Controlled Feature Rollout
Microsoft has started testing the new Window 10 Controlled Feature Rollout feature with Windows Insiders in the Slow ring. This feature allows Microsoft to slowly roll out new features without releasing entirely new builds. [...]
Worst DNS attacks and how to mitigate them
The Domain Name System remains under constant attack, and there seems to be no end in sight as threats grow increasingly sophisticated.
DNS, known as the internet’s phonebook, is part of the global internet infrastructure that translates between familiar names and the numbers computers need to access a website or send an email. While DNS has long been the target of assailants looking to steal all manner of corporate and private information, the threats in the past year or so indicate a worsening of the situation.
Japan To Lead Development of SWIFT Network For Cryptocurrency
Japan's government is leading a global push to set up an international network for cryptocurrency payments, similar to the SWIFT network used by banks, in an effort to fight money laundering, Reuters reports. From the report: Tokyo aims to have the network in place in the next few years, the person said, declining to be identified because the information has not been made public. A team related to the inter-governmental Financial Action Task Force (FATF) will monitor its development and Japan will cooperate with other countries, the source said. It remains unclear how the cryptocurrency network would work. SWIFT is the international payments messaging system used by banks to send money around the world.
Read more of this story at Slashdot.
FaceApp – Users Privacy Threat Really?
Why the Ghost Keys `Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two technical directors at Britain's GCHQ have put forward a proposal they say would provide access that law enforcement and intelligence need in certain cases. But this regime would end up raising most of the same concerns as other encryption back-door proposals floated in recent years.
The post Why the Ghost Keys `Solution’ to Encryption is No Solution appeared first on Just Security.
Mirai Botnet Sees Big 2019 Growth, Shifts Focus to Enterprises
Mirai activity has nearly doubled between the first quarter of 2018 and the first quarter of 2019.
Slack Initiates Mass Password Reset
More victims of a 2015 credential-harvesting incident have come to light.
Kritischer Passwort-Bug behoben: Neue öffentliche iOS 13-Beta ist da
The oakland city council voted unanimously tuesday to ban the use of facial recognition by city departments, including police, making it the third city in the country to do so after san francisco.
Microsoft Adds Office 365 Group Lifetime Auto-Renewal Feature
Microsoft says that a new user activity-based expiration policy can be enabled for Office 365 groups by select Azure AD Premium customers starting today allowing for automated lifetime renewals without any user intervention. [...]
Cylance, I Kill You! (Skylight Cyber)
We've just released our new research showing how we reversed-engineered a leading AI-based endpoint protection product (Cylance), were able to understand how its model works and abuse a bias to create a rather amusing universal bypass.
Bottom line: append a carefully extracted list of strings to the end of any malware to create a FUD variant.
Ex-Microsoft Worker Charged in Alleged Scheme To Steal $10M in Gift Cards and Use Funds To Finance Extravagant Purchases
An anonymous reader shares a report: A former Microsoft worker has been arrested and charged with mail fraud, in an alleged scheme to steal $10 million worth of digital currency from his ex-employer and use the funds to finance extravagant purchases, including a Tesla and lakefront home. Volodymyr Kvashuk, a 25-year-old software developer and Ukrainian citizen who worked for Microsoft from 2016 to 2018, allegedly took advantage of a testing program meant to simulate customer purchases. He made test accounts to obtain Microsoft gift cards and then sold some or all of them through online resellers.
Read more of this story at Slashdot.
Disable SELinux on CentOS 7 / RHEL 7 / Fedora Linux
I need to disable SELinux on CentOS 7. How can I disable SELinux from the command line over ssh based session?
The post Disable SELinux on CentOS 7 / RHEL 7 / Fedora Linux appeared first on nixCraft.
Businesses Grow More Vulnerable to Email Attacks, Even with Improved Defenses
Editor's Note: This post can originally be found on the Agari Email Security blog.
By Patrick Peterson
Cybercriminals increasingly use new forms of identity deception to launch an email attack to target your weakest link: humans.
Call it a case of locking the back window while leaving the front door wide open. Throughout the last year, a number of reports have surfaced about sophisticated cyberattacks that are proving all too successful at circumventing the elaborate defenses erected against them.
Firewall? Check. Application security? Check. Endpoints? Those are covered, too. Yet despite the millions organizations spend each year on perimeter security, the bad guys are still winning. In 2018, cybercrime losses exceeded $2.71 billion in the United States alone.
But how can this be possible? How can businesses grow more vulnerable even as their defenses harden? As it turns out, 97% of organizations are failing to effectively leverage modern technology to protect against the number one target cybercriminals use to implement their schemes—human beings.
Indeed, whether it’s the Marriott breach that exposed the personal information of up to 500 million people or the 12 million patient records stolen through the Quest Diagnostics breach, cyberattacks tend to have one thing in common—they almost all involve identity deception perpetrated against specific individuals. And that means they almost always start with email.
Mission Impersonate for Data Access
The fact is, email is still the most popular tool for business communication and collaboration. But most email security systems are falling short in protecting organizations against fraud.
Today, up to 94% of data breaches start with an email reaching a well-placed target. And while you may think this number is excessively high, we’re not talking about the typo-laden phishing email attacks of the early 2000s.
Cybercriminals now produce flawlessly crafted messages capable of deceiving virtually anyone. They’ve also come to understand something far more critical to their success—you’re much more likely to be fooled into disclosing sensitive information or downloading dangerous malware if you’re reacting to a trusted colleague or someone you wish to impress.
Take the current trend in file-sharing email fraud. According to CSO, cyberthieves are increasingly leveraging information from social media to target corporate employees and then posing as colleagues and sending them file-sharing phishing emails from OneDrive and other popular cloud services.
Embedded links within the emails lead recipients to fake sign-in pages, where they’re prompted to enter their personal credentials. Attackers then leverage those credentials to hijack the real accounts of victims, where they can steal valuable information, access contact lists, and launch ever-more devastating attacks.
The problem is that most email security solutions can’t detect this kind of fraud because the login page is hosted on a compromised website with a good reputation.
Advanced Email Attacks: Personalized & Pernicious
Most identity deception-based email attacks increasingly follow a similar playbook. First, they leverage popular cloud services in order to make infrastructure reputation less reliable. After all, it’s not as if organizations can simply blacklist the likes of Google or Microsoft, since they also send a large amount of legitimate email.
Second, they appear to come from identities and brands the target trusts. Think simple display name ploys, where fraudsters insert a trusted identity within the “from” field within Gmail and Yahoo so it appears to be legitimate. Or domain spoofing, which involves displaying a legitimate email address, which is possible when organizations do not secure their brands from cybercriminals. But that’s not all.
In a look-alike domain email attack, criminals substitute say, “invoices-acme.com” for an actual domain, like “acme.com,” to send fraudulent invoices. And then there are account takeover attacks, which originate from legitimate (but compromised) accounts and are notoriously difficult to detect since there is little indication that the emails are not who they say they are from.
Whatever the technique, the highly personalized messages within these emails are designed to be indistinguishable from everyday business email—rendering traditional content analysis ineffective. The goal is to manipulate the recipient into taking some action or disclose some piece of information that they assume will be safe, and unfortunately, they are more successful than we’d like.
Stemming the tide of such attacks won’t be easy.
Securing the New Perimeter Against Phishing Attacks
Security awareness and phishing training can help employees detect some of these new forms of email attacks. But the quality and sheer volume of new email schemes mean that will only go so far.
And yes, Domain-based Message Authentication Reporting and Conformance (DMARC)protocols can help stop domain spoofing and brand hijacking. But 97% of companies have yet to set up policy parameters to optimize effectiveness. But even then, this doesn’t protect against all the attacks that target employees and partners.
It’s also unclear how many organizations are deploying machine learning technologies with the kind of modeling and analytics capabilities needed to go beyond content analysis and infrastructure reputation to assess people, relationships, and behaviors and put an end to the identity deception-based email attack.
As it stands now, there probably aren’t enough of them. Cybercrime is only continuing to increase as criminals become smarter, so we must be prepared to take a stand against them. All this to say, we better hope more organizations move beyond just securing that “back window” on the perimeter—and stop the endless stream of identity-based email attacks flowing through their front door.
To learn more about identity deception and the rapidly evolving threat from email attacks, download our report on the latest trends in email fraud.
Stalkerware Apps Found On Google Play
Mobile threat researchers at Avast have detected seven apps on the Google Play Store that were all likely designed by a Russian developer to allow people to stalk employees, romantic partners, or kids. Avast detected and reported four of the apps to Google yesterday, who removed them from the Play Store. Today, the researchers detected …
Bulgaria's Hacked Database Leaks To Hacking Forums
The database of Bulgaria's National Revenue Agency (NRA), which was hacked over the weekend and sent to local reporters, is now being shared on hacking forums, ZDNet has learned from sources in the threat intelligence community. From a report: Download links to the hacked database have been shared by a hacked data trader known as Instakilla, believed to be operating out of Bulgaria. ZDNet obtained a copy of the database and verified its authenticity with local sources, and this is a copy of the same database sent to local media over the weekend. The database contains 57 folders, 10.7 GB in size, and holds personal and financial information consistent with what Bulgarian newspapers reported receiving over the weekend. This includes personally identifiable information, tax information, from both the NRA, and from other government agencies who shared their data.
Read more of this story at Slashdot.
242 Mio. Euro Geldbuße: Qualcomm verkaufte UMTS-Chips unter Wert
Windows 10 20H1 Build 18941 Fixes OneDrive Search Crashes
Microsoft has released Windows 10 20H1 Insider Preview Build 18941 to Insiders in the Fast ring. This build includes various fixes, such as for a crash when searching the OneDrive folder, and a new Korean IME. [...]
Two years after promising to report all http-based web pages as insecure, mozilla is about to deliver.
Bulgaria's hacked database is now available on hacking forums
Half of the database, to be exact, the half the hacker released to local reporters over the last weekend.
Slack Resets Passwords For Users Who Hadn't Changed It Since 2015 Breach
If you use Slack, a popular cloud-based team collaboration server, and recently received an email from the company about a security incident, don't panic and read this article before taking any action. Slack has been sending a "password reset" notification email to all those users who had not yet changed passwords for their Slack accounts since 2015 when the company suffered a massive data
Over 800,000 Systems Still Vulnerable to BlueKeep Attacks
SeitennavigationSeite 6 von 4.265 Seiten (Bei Beitrag 175 - 210)
149.260x Beiträge in dieser Kategorie
Auf Seite 5 zurück | Nächste 7 Seite | Letzte Seite
[ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ]  [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ]